• Home
  • Coursework
    • Cybersecurity Fundamentals
    • Cryptography
    • Enterprise Security Architecture
    • Cybersecurity Law & Policy
    • Cybersecurity Risk Management
    • Management and Cybersecurity
    • Secure Software Design and Development
    • Network Visualization and Vulnerability Detection
    • Cyber Threat Intelligence
    • Incident Response and Computer Network Forensics
  • Reference Link Library
  • Contact
Course Summary
The Risk Management Framework (RMF) maintained by the National Institute of Standards and Technology (NIST) dictates how IT systems should be architected, secured, and monitored. NIST details the risk management processes in several subsidiary frameworks. The most important is NIST 800-37, which defines RMF as a six-step process to engineer and secure data (Petters, 2020).
The six processes are; prepare, categorize, select, implement, assess, authorize, and monitor. Each element is interrelated, and the lines of communication go between them. The output by one element becomes the input to another element. (Crc.nist.gov, 2022)
  • Prepare: These activities prepare an organization to manage security and privacy risks.
  • Categorize: To categorize information processed, stored, and transmitted based on an impact analysis. 
  • Select: the set of NIST (National Institute of Standards and Technology) SP 800-53 controls to protect systems based on risk assessments.
  • Implement: Implement the controls and document how controls are deployed. 
  • Assess: Assess if the controls implemented are in place, operating as intended, and producing the desired results. 
  • Authorize: The Senior office makes a risk-based decision to authorize the system. 
  • Monitor: Continuously monitor control implementation and risks to the system.

Picture
The NIST risk management framework is a set of standards designed to be followed by federal agencies. Still, it is also popular among the private sector since it has practical guidance on protecting systems. 
Practical implementation of the NIST risk framework is challenging to follow and must be initiated by professionals in the field. It’s essential to start with a risk assessment of any organization and then follow through with the remediation. Security takes time, so remediation processes shall be rushed into. It’s overwhelming to determine how many risks are identified by conducting the first assessment; remediation plans should be thorough and well-planned. Cybersecurity professionals are ethically responsible for seeking third-party help if the internal IT security department cannot apply remediation procedures. (Johnson, 2019)

​
Coursework Artifact
csol_530_final_project.pdf
File Size: 361 kb
File Type: pdf
Download File

The final project of CSOL 530 or cybersecurity risk management focuses on broad explanation of NIST Risk Management Framework.
Reflections
The selection of the final project from the CSOL 530 course was prompted because this white paper discusses my understanding of all aspects of the Risk Management Framework (RMF), including a plan for continuous monitoring. Categorizing, selecting, implementing, assessing, authorizing, and monitoring are the steps necessary based on NIST’s (National Institute of Standards and Technology) RMF to have an effective plan for managing risk. Understanding the methods, activities, and documentation followed in each framework step. 

Critical insight and understanding of the RMF, as insisted by NIST, is that the steps in its framework do not have to perform in a given order. But going through phases in a hierarchical order is crucial to implementing an effective risk management process (Veltsos, 2019). 

Cybersecurity leaders are professionally and ethically responsible for prioritizing the protection of the most critical systems and assets, reducing complexity, and automating monitoring and controls.

A well-thought risk management framework ensures that any organization takes the most proper steps in aligning its risk tolerance with the layers of security needed to adequately protect its network systems and data (Peaslee & Morris, n.d.).

​

References
Csrc.nist.gov. (2016, November 30). NIST Risk Management Framework. NIST Risk Management Framework | CSRC. https://csrc.nist.gov/Projects/risk-management/about-rmf/select-step
Petters, J. (2020, March 29). Risk Management Framework (RMF): An Overview. Varonis. https://www.varonis.com/blog/risk-management-framework
​Johnson, B. (2019, April 23).
Applying a Risk Management Framework to Improve Information Security. Netwrix Blog. Retrieved March 6, 2023, from https://blog.netwrix.com/2019/04/23/applying-a-risk-management-framework-to-improve-information-security/
​Veltsos, C. (2019, July 22).
NIST Says Preparation Is Key to the Risk Management Framework. Security Intelligence. Retrieved March 6, 2023, from https://securityintelligence.com/articles/nist-says-preparation-is-key-to-the-risk-management-framework/
​Peaslee, N., & Morris, R. (n.d.).
Implement Your Risk Management Framework Cost Effectively. Graham Technologies. Retrieved March 6, 2023, from https://www.graham-tech.net/implement-your-risk-management-framework-cost-effectively/​


​
  • Home
  • Coursework
    • Cybersecurity Fundamentals
    • Cryptography
    • Enterprise Security Architecture
    • Cybersecurity Law & Policy
    • Cybersecurity Risk Management
    • Management and Cybersecurity
    • Secure Software Design and Development
    • Network Visualization and Vulnerability Detection
    • Cyber Threat Intelligence
    • Incident Response and Computer Network Forensics
  • Reference Link Library
  • Contact